Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 00:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
223813ceb88edbfde22d82ebb222db6c.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
223813ceb88edbfde22d82ebb222db6c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
223813ceb88edbfde22d82ebb222db6c.exe
-
Size
685KB
-
MD5
223813ceb88edbfde22d82ebb222db6c
-
SHA1
71ca083274c34312b666989684922c680fe5524d
-
SHA256
dea7b64b5faf84fda767373caa41c5b9c22df730806ee134c20aa2fc15db78d5
-
SHA512
9bb15b2b83fbb2fae6a7bd6e2f833f740ce961c4906616e49bace0823ddf79d68cee15c3b416607377753dae218dba81787ac6a7b5de505e041edf311730560d
-
SSDEEP
12288:5VGbImthaXa5j2asmTgnTlVY+KaBwPBlF3Z4mxxpDqVTVOCi:5gEmt7xgbwbQmXAVTzi
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2684 iexplore.ra -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\iexplore.ra 223813ceb88edbfde22d82ebb222db6c.exe File opened for modification C:\Windows\iexplore.ra 223813ceb88edbfde22d82ebb222db6c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2288 223813ceb88edbfde22d82ebb222db6c.exe Token: SeDebugPrivilege 2684 iexplore.ra -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.ra -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2580 2684 iexplore.ra 28 PID 2684 wrote to memory of 2580 2684 iexplore.ra 28 PID 2684 wrote to memory of 2580 2684 iexplore.ra 28 PID 2684 wrote to memory of 2580 2684 iexplore.ra 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\223813ceb88edbfde22d82ebb222db6c.exe"C:\Users\Admin\AppData\Local\Temp\223813ceb88edbfde22d82ebb222db6c.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:2580
-
C:\Windows\iexplore.raC:\Windows\iexplore.ra1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2684